Now showing items 663-682 of 820

    • Retrospective analysis on financial news & NIFTY50 

      Lakkad, Tanvi (2020)
      Nowadays, a plethora of financial news related to different businesses and stocks are available through various sources. Market movements directly or indirectly get affected by various factors such as economic, political, ...
    • Revamping pillion module for dunzo user application 

      Naik, Prachi (2020)
      Dunzo is a Google backed all-in-one 24X7 delivery platform, that fetches and delivers anything and everything within the city. In 2018, Dunzo launched a new feature of bike taxi. Since it was a trial based feature and due ...
    • RF power harvesting and enhancing throughput in a optical link based sensor network 

      Nambiar, Sainath Gopi (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      Energy is one of the most important constraint inWireless Sensor Network (WSN), all the existing protocols, architectures revolve around the power plane. As the sensor network scale, their feasibility of implementation ...
    • Road detection for intelligent transport systems 

      Shah, Falak (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Road detection is an important machine vision problem with applications to driver assistance systems and autonomous vehicles. We carried out a literature survey of the state of the art road detection algorithms. Simulations ...
    • Robust and secure watermarking scheme based on singular values replacement 

      Gupta, Akshya Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2010)
      Digital watermarking is used to carry information by embedding information into the cover data in a perceptually visible or non visible manner. In today's sea of digital information, there are many problems associated like ...
    • Robust surface coverage using deterministic grid based deployment in wireless sensor networks 

      Kulkarni, Rucha (Dhirubhai Ambani Institute of Information and Communication Technology, 2010)
      The rapid progress in the field of wireless communication ans MEMS technology has made wireless sensor networks (WSN) possible. These networks may have low cost sensors deployed which are capable of sensing any activity ...
    • Routing and wavelength assignment in DWDM networks 

      Gupta, Dharmendra (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      All-Optical Networks employing Dense Wavelength Division Multiplexing (DWDM) are believed to be the next generation networks that can meet the ever-increasing demand for bandwidth of the end users. The problem of Routing ...
    • Routing game in wireless network 

      Borana, Lokesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      In this paper we have discussed about pricebased reliable routing in wireless AdHoc network. <p/>Because of the selfish behavior of the nodes in the network the path chosen is not equilibrium path. We have considered the ...
    • Rule based approach for aspect extraction from product reviews 

      Rathore, Rahul (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      With the advent of technology, there has been an escalation in the usage of Internet and social media. This led to the generation of tremendous amounts of data on a daily basis. While sentiment analysis provides fantastic ...
    • Scalable routing in mobile ad hoc networks 

      Patel, Brijesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      In Mobile Ad Hoc Networks (MANETs), performing routing is a challenging task in presence of the varying network parameters like node mobility, traffic and network size. It is very important to analyze the scalability ...
    • Scheduling and isolation in virtualization 

      Somani, Gaurav (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Virtual machine (VM) based server implementation is popular for numerous advantages like fault isolation, efficient hardware utilization, security and ease of management. Virtual machine monitor (VMM) like Xen is a popular ...
    • Scheduling in grid: rescheduling MPI applications using a fault-tolerant MPI implementation 

      Reddy, M. Vivekananda (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Due to advancement in grid technologies, resources spread across the globe can be accessed using standard general purpose protocols. Simulations and scientific experiments were earlier restricted due to limited availability ...
    • Schema based indexing for namespace mapping of raw sparql and summarization of lod 

      Hapani, Hitesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Linked open data(LOD) in Semantic Web is growing day by day. There are datasets available that can be used in different application. However, identifying useful dataset from cloud, determining the quality and obtaining ...
    • Secure and efficient key assignment scheme for dynamic access control in a hierarchy 

      Vadnala, Praveen Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Secure SQL with access control for database as a service model 

      Dave, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Rapid growth of internet and networking technology emerges "Software as a service model". In this model, application service providers (ASP) provides each functionality of software over internet. ASP provides access of ...
    • Security analysis of two fair exchange protocols 

      Gahlot, Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
    • Security and Privacy concerns in Voice Assistants Devices 

      Trivedi, Revant (2021)
      Voice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing ...
    • Security of remote car locking system against eavesdropping 

      Patel, Jinita (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Vehicle industry is growing rapidly. To sustain in the market manufacturer uses various technology in vehicles. In today's world users need more comfort in addition to efficiency of vehicles. With the advancement in the ...
    • Segmentation and classification: optical character recognition algorithms to enhance the accuracy 

      Shah, Ketul Tejas (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      OCR (Optical Character Recognition) is a well known algorithm for the conversion of machine printed or handwritten text images to machine-encoded text. As the word "Optical" is related to light or vision, an OCR system ...